main

DDoSSecurityWAF

WAF and DDoS Help You on the Road to GDPR Compliancy

January 19, 2017 — by Pascal Geenens0

gdpr-compliance-960x539.jpg

Data is the currency of today’s digital economy, the oil of the 21st century. Personal data is considered our economical asset generated by our identities and our behavior and we trade it for higher quality services and products. Online platforms act as intermediaries in a two-sided market collecting data from consumers and selling advertising slots to companies. In exchange for our data being collected, we get what appears to be a free service.

The growth and the market capitalization of social platform providers like Facebook and search engines such as Google demonstrate the value of personal data. Personal data also provides new ways to monetize services as news organizations are finding it difficult to charge ‘real’ money for digital news, but leverage our willingness to pay for a selection of ‘free’ news with our personal data. Every 3 out of 4 persons prefer free registration with selective access over a paid registration with full access.

DDoSSecurityWAF

The Not-So Odd Couple of DDoS and WAF

June 21, 2016 — by Ben Desjardins0

gartner-summit-recap-3-960x640.png

As the saying goes in the real world, “necessity is the mother of invention.” However, those of us that work in the technology sector know that this isn’t always the starting point or source in our arena. There are volumes of cautionary tales and vast, virtual graveyards of “products looking for a problem to solve.” Often, these come about when vendors look across their technology portfolio and identify logical interactions that only they can see. Other times they occur through overzealous business development efforts, a sort of unfortunate “you got your chocolate in my peanut butter” scenario where the result tastes anything but sweet.

SecurityWAF

Cover Your Bases to Protect Your Organization From Advanced Threats

June 15, 2016 — by RussellWarren0

cover-your-bases-2-960x816.png


Organizations can protect themselves against advanced threats by adopting the right strategy. This strategy involves getting the right players on the field, with a complementary set of skills that will provide a team with the right mix of capabilities. In deploying security products into your IT environment, you are looking for the right mix of solutions (security monitoring, protection, analysis, analytics and response capabilities) in order to cover the field. Deploying an effective and efficient set of security solutions will provide you maximum benefits, with improved operational efficiencies and costs.

Application DeliverySecurityWAF

DevOps and Security: Yes We Can

May 19, 2016 — by Ron Meyran0

web-application-firewall-3-960x679.png

Airlines, retailers, travel service providers, banks, marketplaces, and social media – all rely on their web applications to generate revenues or facilitate productivity. They typically develop and maintain their own web applications which are tailored for their business needs. To support the growing needs of their online presence, they are adopting agile development practices also known as DevOps and Continuous Deployment.

DDoSSecurityWAF

Why WAF & DDoS – A Perfect Prearranged Marriage – #2

April 6, 2016 — by David Monahan0

firewall_img_david_m-1.png

David Monahan is Research Director for Enterprise Management Associates (EMA) and is a featured guest blogger.

In previous blogs I have written about DDoS attacks and the inadequacies of using ISP and cloud-based DDoS attack scrubbing by themselves. However, in this blog I am going to speak to why WAF and DDoS filtering make a great pair, focusing on the difference between and the benefits of combining the web application firewall (WAF) and DDoS filtering.

Application DeliveryWAF

How Integrating Application Delivery and a Firewall is like Auto Repair

January 12, 2016 — by Frank Yue2

application-delivery-and-firewall-960x516.jpg

I took my car in for some work a while back. They had to replace a gasket on the engine because it was leaking a bit of oil. When they looked at the problem, they told me that I should replace a few other parts.

This was interesting because the parts were working and not causing any issues. The parts they wanted to replace were reasonably inexpensive, but in order to get to the failing gasket they had to spend a lot of time taking apart the engine. The time and labor to dismantle my engine outweighed the cost of the parts that they recommended replacing. It made sense to do this other work at the same time while they were easy to access. In the long run, this would save me money by not having to take apart the engine later when these components would eventually go bad.

SecurityWAF

Protecting Your Applications Everywhere – Are You in Good Hands?

April 28, 2015 — by Shira Sagiv2

Cloud migration – one of the top trends this past year and predicted by many to be a top trend in 2015 – brings with it many benefits to the organization.  You can enjoy cost savings, scalability, flexibility, and productivity benefits for your organization, your customers and your partners.  Regardless of the industry they belong to, today’s enterprises are finding that the cost and speed advantages of cloud cannot be ignored.

SecurityWAF

The Road to Cyber-Safety is Shifting to Hybrid Cloud WAF Protection

April 20, 2015 — by Michael Groskop2

Hybrid Cloud WAF is the answer.  Now what was the question?

Let’s back up a minute.  There is an ancient riddle which goes something like this:

You are walking down a path and come upon a fork in the road. One side is the good path and the other side is the bad path. However, you don’t know which one is which and both paths are guarded by identical twins. One guard tells the truth and the other, always tells lies. If you want to take the good path, what should you ask the guards? You would ask “which path would your brother go?” Then, take the path opposite from where they are pointing.